Microsoft Defender receives new security tools powered by RiskIQ's Threat Intelligence. This is the perfect outcome of cybersecurity experts working together to achieve a safer digital world. With the new Microsoft Defender Threat Intelligence service and External Attack Surface Management, cybersecurity teams can now act even more precise.
Cyber attacks for political reasons are no longer a surprise. State hackers are actively seeking information from other countries. Belgium reported that its government and army were attacked by Chinese cyber gangs.
Digital threats are reshaping the way businesses operate. Discover a compact list that is of interest to everyone from users to security teams. The most dangerous vulnerabilities that are actively exploited and have a major impact on cybersecurity are highlighted.
Microsoft has become a high profile target for cybercrime. The so-called Raspberry Worm has been detected in hundreds of corporate networks around the world. It spreads to other systems using an infected USB with an .LNK file.
We are familiar with the term Software-as-a-service (SaaS), but a malicious form is now emerging called Ransomware-as-a-service (RaaS). A service from the Blackhat, a well-known hacker group. By offering these services, it is becoming more difficult for security experts to detect them. You can read more about it in this article.
Follina was a zero-day attack within the Microsoft Support Diagnostic Tool. Attackers could execute arbitrary code with the admin permissions of the calling application. In addition, the attacker could install programs, view, modify or delete data. Fortunately, Microsoft came up with a solution on Patch Tuesday in June.
Experts in Cybersecurity. A profession that is highly valued. Due to a scarcity of IT experts, the demand is increasing but the availability is decreasing. Due to the evolutions in cyber attacks, the profession is becoming more and more complex. The annual Voice of SecOPs Report shows that 45% of the respondents are considering leaving the sector because of stress factors.
Cybercrime is on the upswing. They often target organisations that have large amounts of sensitive information. Unfortunately, Kaiser Permanente, a health institute in America, was unable to escape it either. The data breach exposed the health data of 69,000 people.
It is difficult to keep an overview of your software. A bug that was in the software unseen for years is now taking its toll. The weakness is now exploited and the Confluence collaboration tool is unusable. When used, malicious code will be executed remotely.
VMWare, one of the leading companies in cloud computing and virtualisation technology, has been taken over by chip manufacturer Broadcom. This way, Broadcom puts itself in a strong position to grow with data centre infrastructure. The deal amounted to no less than 61 billion dollars.
PWN2OWN is an annual competition during the CanSecWest security conference. Participants are challenged to exploit popular software with known or unknown weaknesses. With respect for ethical hacking, the participants help large organisations to be aware of holes in their software. This year, they managed to exploit Microsoft Teams and Windows 11 on the first day.
Software remains a complex part of the digital world. While fixing critical bugs on Patch Tuesday, other problems came to light. CISA warns not to install the updates on domain controllers due to authentication issues. You can read more about it here.
Lincoln College, built in 1886. A building that has faced many historical disasters such as world wars and financial plunges. But a digital attack in combination with Covid-19 dealt the final blow. Due to a lack of digital security, a ransomware attack wiped out the educational institute.
IT experts are facing a major challenge. The digital footprint of organisations is getting bigger, making cybersecurity a vital part of any organisation. Hybrid work and digital business processes in the cloud have introduced new risks. Cybercriminals show no mercy and will do anything to attack digitally. In this article, you will discover the top trends in Cybersecurity for the year 2022.
Powerful security tools like Intune have a positive impact on your cybersecurity. But many companies overlook an important component: configuration. Configuring all security tools requires high-level expertise. In this article you will read how to implement the security guidelines for Microsoft Intune.
Nerdio Manager provides Azure Virtual Desktop Management. Virtual desktops are created and managed in an intelligent way. Through a cooperation with Microsoft, Nerdio is now also integrated in Microsoft Endpoint Manager for MSPs.
As a software developer, you have to put up with some tough stuff. Especially if you develop popular applications that are well known to users. Malicious parties are constantly looking for weaknesses to attack. Adobe and Chrome provided an emergency update for bugs that were heavily criticised.
The 2022 Olympics is also joining the digital age. Participants are supposed to download the application. But according to security researchers, this app would be a real nightmare in terms of cybersecurity.
Internet Explorer opens a door for cyber criminals to send booby trapped Office files to victims. According to Microsoft, there is no patch yet. The vulnerability is also known as CVE-2021-40444 and is located in MSHTML, the search engine of Internet Explorer.
Device management is an important part of a security strategy. In this article you will read how to gain control over unmanaged PCs. This can be done with the help of Microsoft Azure, Intune and the necessary expertise.
Cybersecurity is important to everyone. Whether you are a user or an IT expert. Understanding the basics of how to protect yourself digitally is a must. But how do you talk about cybersecurity with someone who is not yet as skilled in the digital world? In this article you will discover how to talk about cybersecurity with others.
As the number of security technologies continues to grow, so does the number of cyber-attacks. MFA or Multifactor Authentication is used to provide initial security for sign-in events. Although it is a fully-fledged security method, there are also criminals who try to bypass it. This is what we see with this phishing kit.
Microsoft wants to fully migrate to Microsoft 365. On Monday, they announced that Office 2016 and Office 2019 can no longer be connected to Microsoft 365 services. These include Exchange Online, Sharepoint Online and OneDrive for Business. The end-of-support will start from October 2023.
A zero-day attack means that a flaw in a system is exploited without the developer knowing about it. This vulnerability in Microsoft Windows allowed attackers to execute malicious code without the user's knowledge. A follow-up to the "Follina incident".
Microsoft is one of the biggest pioneers in digital security. They recognise the need for trust in a world where everything is connected. Microsoft Entra is its new product line that encompasses everything around identity and access security.
Cyber attacks are no longer uncommon these days. Hackers are becoming more and more creative and savvy, so that gateways are discovered more quickly. Microsoft Word turned out to be unsafe due to a zero-day attack characterised as "Follina". According to experts, nothing can be done about this when the code has already been injected.
Managed Service Providers (MSPs) are facing increasingly difficult times. Because they manage entire IT environments of other companies, they are an interesting target for cybercriminals. A security strategy is the only solution.
Microsoft is actively tackling cybercrime. With its team of experts and advanced AI, they play an important role in detecting and solving known weaknesses. Every month on Patch Tuesday, they present solutions to patch the flaws in systems.
Microsoft's innovation provides the next step towards AI cybersecurity. With Microsoft Sentinel SOAR, cyber threats are automatically detected using Artificial Intelligence. This combined with a team of experts ensures a solid defense against cybercriminals.
The digital world remains flexible. For IT professionals as well, flexibility continues to play an important role within their field of work. Microsoft Endpoint Manager (MEM) now gets a Cloud Add-On, which gives them more possibilities to offer remote support.
A network switch is designed to create multiple connections from one network connection without any loss of speed. They are often used in airports, hotels, companies and hospitals. Due to weaknesses in the network switches of Aruba and Avaya, millions of devices are now vulnerable.
The best way to protect yourself from a hacker? According to this article, it is using AI that gets inside a hacker's head. In this way, it predicts which components a hacker would attack first. The technology is also called Darktrace attack path modelling.
Lenovo models were affected by flaws in the firmware. As a result, more than one hundred models were vulnerable to malware. Because they are hidden in the motherboard's flash chip, they are difficult to detect and remove.
The war in Europe is causing international turmoil. The security industry is also bracing itself. It is no longer a secret that state hackers exist. Cyber attacks for political reasons are part of a geopolitical war.
A security strategy for companies is crucial. Zero-day attacks are becoming increasingly common and pose a major threat. They are weaknesses that have been discovered by attackers but not by the software developer. As a result, it can take a long time to fix them, which makes the risk enormous.
To stay one step ahead of cybercriminals, it is important to work together. As the threat of ransomware continued to grow, the US, UK and Australia decided to jointly provide cyber security advice on ransomware threats. In this way, critical infrastructures are uncovered and a solution can be proactively sought.
Multifactor Authentication (MFA) has become the basic of access security. Cybercriminals are aware of this. With MFA you often get a notification on your smartphone to log in. These notifications can now also be faked. In this article you can read how this works.
A cyber attack on ARA caused problems in fuel distribution. ARA stands for Amsterdam, Rotterdam and Antwerp - the nerve centre of Europe's oil and fuel trading network. Cybercriminals target all types of companies.
Technology never ceases to amaze us. This new innovation in a Raspberry Pi means that no software is needed to detect malware. It uses electromagnetic signals to detect other devices. With certain signals it can determine if there is malware on the device.
Patch Tuesday in December provided many bug fixes. Microsoft patched 67 new vulnerabilities, 7 of which are rated "critical". In addition, Apache Log4j is still causing concern. Trend Micro released a tool to analyse affected systems.
An ultimate security strategy also means thinking about Attack Surface Management. This means that you create as few access points as possible to be attacked. In case you are attacked, you are prepared and the attack cannot spread laterally on your network. In this article, you'll read how to prevent cloud and hybrid apps from becoming entry points.